Author of the publication

Preserving Incumbent Users' Privacy in Server-Driven Dynamic Spectrum Access Systems.

, , , , , , and . ICDCS, page 729-730. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Implications of DNSSEC Look-Aside Validation., , and . ICDCS, page 2438-2443. IEEE Computer Society, (2017)Addressing Smartphone-Based Multi-factor Authentication via Hardware-Rooted Technologies., and . ICDCS, page 1910-1914. IEEE Computer Society, (2017)ABC: Enabling Smartphone Authentication with Built-in Camera., , , , , and . NDSS, The Internet Society, (2018)A symmetry breaking transition in the edge/triangle network model., , and . CoRR, (2016)Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing., , , , , and . IACR Cryptology ePrint Archive, (2009)InverseNet: Solving Inverse Problems of Multimedia Data with Splitting Networks., , , , , , , and . ICME, page 1324-1329. IEEE, (2019)Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data., , , , and . IEEE Trans. Image Processing, 25 (7): 3411-3425 (2016)A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks., , and . WISEC, page 62-67. ACM, (2008)Fast and scalable secret key generation exploiting channel phase randomness in wireless networks., , , and . INFOCOM, page 1422-1430. IEEE, (2011)Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data., , , , , and . INFOCOM, page 1-9. IEEE, (2016)